gptkbp:instance_of
|
gptkb:United_States_federal_law
|
gptkbp:aims_to
|
Information security posture of federal agencies
|
gptkbp:amended_by
|
gptkb:Federal_Information_Security_Modernization_Act_of_2014
|
gptkbp:applies_to
|
Federal executive branch agencies
|
gptkbp:defines
|
Information security controls
|
gptkbp:effective_date
|
gptkb:2002
|
gptkbp:enacted_by
|
gptkb:legislation
|
gptkbp:enforces
|
gptkb:Office_of_Management_and_Budget
|
gptkbp:established
|
National Institute of Standards and Technology guidelines
|
gptkbp:governed_by
|
gptkb:Office_of_Management_and_Budget
|
https://www.w3.org/2000/01/rdf-schema#label
|
FISMA
|
gptkbp:influenced_by
|
gptkb:Clinger-Cohen_Act
|
gptkbp:is_connected_to
|
gptkb:Federal_Risk_and_Authorization_Management_Program
gptkb:NIST_Special_Publication_800-53
Information Assurance
Continuous Diagnostics and Mitigation
|
gptkbp:is_criticized_for
|
Lack of enforcement mechanisms
Ambiguity in compliance requirements
|
gptkbp:is_evaluated_by
|
gptkb:government_agency
gptkb:Detective
gptkb:Research_Institute
Annual reports to Congress
|
gptkbp:is_implemented_in
|
gptkb:Police_Department
|
gptkbp:is_influenced_by
|
gptkb:Executive_Order_13800
gptkb:Homeland_Security_Act_of_2002
|
gptkbp:is_monitored_by
|
gptkb:Federal_Information_Security_Modernization_Act
gptkb:Cybersecurity_and_Infrastructure_Security_Agency
|
gptkbp:is_part_of
|
gptkb:Federal_cybersecurity_framework
gptkb:Federal_Information_Security_Program
U. S. cybersecurity policy
U. S. federal regulatory framework
U. S. government cybersecurity strategy
|
gptkbp:is_related_to
|
gptkb:Privacy_Act_of_1974
gptkb:Company
gptkb:Federal_Information_Security_Management_Act_of_2002
gptkb:software
gptkb:Federal_Information_Security_Management_Act
|
gptkbp:is_subject_to
|
Federal audit requirements
|
gptkbp:is_supported_by
|
gptkb:Federal_Cybersecurity_Workforce_Strategy
gptkb:Cybersecurity_and_Infrastructure_Security_Agency
gptkb:National_Cybersecurity_Strategy
|
gptkbp:mandates
|
Annual independent security assessments
|
gptkbp:promotes
|
Continuous monitoring of information systems
|
gptkbp:purpose
|
To secure federal information systems
|
gptkbp:related_to
|
Information security
|
gptkbp:reports_to
|
Congress on information security programs
|
gptkbp:requires
|
Federal agencies to develop, document, and implement an information security program
|
gptkbp:risk_factor
|
Risk assessments for information systems
|
gptkbp:signed_by
|
gptkb:George_W._Bush
|
gptkbp:supports
|
Cybersecurity initiatives
|
gptkbp:training
|
Federal employees on information security
|
gptkbp:updates
|
gptkb:Cybersecurity_Enhancement_Act
|
gptkbp:bfsParent
|
gptkb:Fed_RAMP
|
gptkbp:bfsLayer
|
4
|